This article is the result of contributions by people from every
facet of the Atari community. Many thanks to all the users,
developers, sysops, and others who provided the investigators with
information and assistance.
[Note: Stand-alone quotations are framed on the left and right by
the "~" character.]
Small Developers, Big Business
How Pirate BBSs Impact on the Entire Atari Community
by D.A. Brumleve, President, IAAD
Copyright 1993 by D.A. Brumleve
The Independent Association of Atari Developers represents over
sixty companies supporting the Atari ST platform with commercial
software and hardware. Now and then a "pirate" BBS will come to
our members' attention. We'll capture the file areas and study
them. We'll cringe at the download counts and growl at the
messages about our products. We'll download copies of our
products and trace the original owner. Sometimes we'll even file
a police report, but the pirate board stays up and callers keep
calling, downloading, and uploading our programs. And every time
we leave this experience further demoralized, less enthusiastic
about writing for the ST, less enthusiastic about programming in
_general_.
Recently, the IAAD undertook a more comprehensive investigation
of pirate BBSs in North America. We solicited information from
the public -- and the Atari community responded. In spite of
some previous experience with pirate boards, I was not at all
prepared for the amount of pirate activity we found.
On each pirate BBS, we found numbers for other BBSs, many of
which also proved to have copyrighted files. We found
concentrated pockets of heavy pirate activity in the Southwest,
the East, and the Southeast, but we also found isolated pirate
boards in just about every region of the continent. We found
small boards with few users and fewer files; we found big boards
with hundreds of users offering nearly every commercial program
on the market of current interest. We found young teens actively
involved in criminal activity -- and older, more experienced men
showing them the ropes. On every user list, I encountered folks
I know: the doting father who bought Super Kidgrid for his
daughter at a show, the user group officer who contacted me for
IAAD brochures, and many, many others who chat with me from time
to time on the major pay services.
Because of the scope and scale of this activity, I feel that it's
important to share our findings with the Atari community at
large. What follows is the outcome of our investigation.
1. The Damage
~ This BBS DOES NOT support the transfer of any pirated ~
~ software. ~
-- Rats Nest BBS
~ Rats Nest always had some of the best stuff around... ~
--Zaphod Beeblebrox on Fawlty Towers BBS
When people pirate programs they would otherwise buy, developers
and dealers (and distributors) lose sales. Dealers respond to
low sales by closing or supporting another platform. Developers
respond to low sales by raising their prices or by dropping the
product; either way, the market is damaged.
How badly damaged? Let's take a look at just some of the
commercial applications and utilities which were until recently
available on the Rats Nest in Loma Alta CA. For the sake of
brevity, I've limited this particular list to products of IAAD
members and Atari Corporation; thus this list does not include
applications and utilities by publishers who are not members of
the IAAD, public domain files, or shareware programs.
_
____ __ / \
/ \ / \ \ /
\ | | ___ | \ / \ _____ /\ ___
| | __ _ __\ /__ /\ | \| |/ \ / /__\ /__
| / / \/ \/ \ / / | |\ | -- // // \
| \| | \ |\__ __// / | | \ | ___\\ \\__ __/
| |\ | | | | | | \ \ | | \ |\_____/ \ \ | |
| | \ | / | | | \ \ | | \_/ / / | |
\ / \/\__/\./ \ / / / \ / / / \ /
/ \ | / \ / / / \ / / / \
\./ | \./ / / \./ \/ \./
| | \/ | | |
| . . | . . |
. | .
.
*^* (#1) Applications *^*
### | Filename.Ext Size Date Brief Description
|
5 | Maxif_3A.Lzh 55665 01-03-92 MaxiFile v3.3a
13 | Hdsentry.Lzh 33922 01-10-92 HD Sentry... HD optimizer, fixer
18 | Xboot .Lzh 37888 01-18-92 X-Boot, like Desk Manager
19 | Steno .Lzh 28885 01-18-92 STeno, from Gribnif. Sortof Flakey
36 | Gramxprt.Lzh 84265 02-05-92 Grammer Expert
37 | Grnslamc.Lzh 56066 02-05-92 Gran Slam!
48 | Codeke13.Lzh 98427 02-05-92 CodeKeys v1.3 from Gribnif
49 | Mltdsh33.Lzh 217352 02-05-92 MultiDesk Deluxe v3.3
56 | Knife108.Lzh 87757 02-05-92 Knife ST!
71 | Lookpop .Lzh 109631 02-07-92 Look It! and Pop It! from Codeheads
72 | Imagecat.Lzh 290048 02-07-92 ImageCat 2.o
111 | Hpas_A .Lzh 247343 02-22-92 High Speed Pascal, Disk 1 of 2
112 | Hpas_B .Lzh 269757 02-22-92 High Speed Pascal, Disk 2 of 2
150 | Tos_206 .Lzh 77116 03-22-92 Tos 2.06 software vertion
151 | Hyprlink.Lzh 271744 03-28-92 HyperLink
164 | Chem1_2 .Lzh 217327 04-05-92 Chemistry - Arrakis educational
165 | Chm2Sts1.Lzh 222763 04-05-92 Chemistry 2 and Stats from Arrakis
166 | Alg11_12.Lzh 224322 04-06-92 Algebra 1 from Arrakis educational
167 | Alg12_21.Lzh 247109 04-06-92 Algebra 2 from Arrakis
168 | Al3_1Tr1.Zip 239499 04-06-92 Algebra 3 Trig 1 from Arrakis
173 | Neocli .Lzh 66076 04-19-92 NeoDesk Command Line... nice
178 | Tos1_4 .Zip 123342 04-25-92 To let ya run those stubern 1.4 tos
soft
197 | Xboot257.Zip 51420 05-06-92 Newest Version of X-Boot (v2.57)
221 | Tw13E_A .Lzh 703536 05-17-92 That's Write 1.3 - English - 1/2
222 | Tw13E_B .Lzh 703536 05-17-92 That's Write 1.3 - English - 2/2
228 | Gen106_A.Lzh 192808 05-17-92 That's Relative 1.06 1/2 ELITE release
229 | Gen106_B.Lzh 130361 05-17-92 That's Relative 2/2 ELITE release
243 | P_Nix15A.Lzh 427252 05-30-92 Phoenix v.1.5 - Disk 1 of 3
244 | P_Nix15B.Lzh 410836 05-30-92 Phoenix v.1.5 - Disk 2 of 3
245 | P_Nix15C.Lzh 410836 05-30-92 Phoenix v.1.5 - Disk 3 of 3
258 | Tracker .Lzh 402564 06-08-92 Rolodex/Client Tracking util
287 | Mint80A .Lzh 503661 07-20-92 MultiTos v8.0 [1/3]
288 | Mint80B .Lzh 181797 07-20-92 MultiTos v8.0 [2/3]
289 | Mint80C .Lzh 263956 07-20-92 MultiTos v8.0 [3/3]
297 | Scanlitd.Arc 33361 08-01-92 Hand Scanner software
308 | Codehed4.Lzh 191763 08-08-92 CodeHead Utilities rel.4 (1991)
317 | Clnup426.Lzh 91942 08-29-92 ICD CleanUP 4.26 Host required
334 | Edhak236.Lzh 43125 09-12-92 Edhack v2.36 (patched from v2.35)
335 | Dmd_Edge.Lzh 149439 09-13-92 Diamond Edge 1.0 ELITE release
352 | Dback250.Lzh 85508 10-03-92 Diamond Back 2.50 latest
356 | Warp9373.Lzh 338270 10-07-92 Warp 9 3.73 Complete Package
374 | L_Rad_E1.Lzh 631730 10-18-92 Redacteur 3 1/4 (english) ELITE
release
375 | L_Rad_E2.Lzh 485004 10-18-92 Redacteur 3 2/3 (eng) ELITE release
376 | L_Rad_E3.Lzh 660252 10-18-92 Redacteur 3 3/4 (eng) ELITE release
377 | L_Rad_E4.Lzh 525994 10-18-92 Redacteur 3 4/4 (eng) ELITE release
378 | Icdb604C.Lzh 12971 10-18-92 ICD Booter 6.0.4 (crack'd) by Zaphod
388 | Harleq21.Lzh 360135 11-12-92 Harlequin 2.01 Genesis INC
release(old)
392 | Adspeed .Lzh 95744 11-20-92 ICD Adspeed Accelerator Software.
396 | Harl_206.Lzh 354749 11-26-92 Harlequin vrs. 2.06
402 | Spectre3.Zip 446203 12-02-92 Spectre 3.0 software
403 | Xboot300.Lzh 59385 12-04-92 X-Boot v3.00
408 | Cache_Cr.Lzh 33876 12-13-92 Cache 2.56 ELITE hacked/all features
410 | Mvg200 .Lzh 488069 12-13-92 Multi Vue Graphica 2.0
421 | Cardf403.Lzh 186987 01-03-93 Card File 4.03 from Gribnif lates ver
422 | St_Sutra.Lzh 657385 01-03-93 STSutra ELITE release still beta..
453 | Uvk5_7 .Lzh 276224 02-01-93 UVK 5.7gb latest vr
460 | Falcprgs.Lzh 572035 02-03-93 The Programs included with the Falcon.
470 | Icdpro68.Lzh 528187 02-06-93 ICD Boot PRO 6.0.8!
474 | Tos206B .Zip 148016 02-07-93 TOS 2.06 as a program!
480 | Calpro_2.Lzh 332815 02-18-93 Calligrapher Professional [2/5].
481 | Calpro_3.Lzh 305163 02-18-93 Calligrapher Professional [3/5].
482 | Calpro_4.Lzh 406075 02-18-93 Calligrapher Professional [4/5].
483 | Calpro_5.Lzh 328443 02-18-93 Calligrapher Professional [5/5].
494 | Mint_81 .Lzh 407624 02-22-93 mint81
502 | Neo303_1.Lzh 354937 03-06-93 NeoDesk 3.03 "MASTER" disk [1/3]
503 | Neo303_2.Lzh 328564 03-06-93 NeoDesk 3.03 "EXTRAS" disk [2/3]
504 | Neo303_3.Lzh 24763 03-06-93 NeoDesk 3.03 Util disk [3/3]
514 | Cali3_2 .Lzh 273959 03-13-93 Calligrapher 3, 2/4
515 | Cali3_3 .Lzh 309849 03-13-93 Calligrapher 3, 3/4
516 | Cali3_4 .Lzh 504895 03-13-93 Calligrapher 3, 4/4
531 | Cali3100.Lzh 290501 03-23-93 Caligrapher 3 Pro 100% disk 1 CO/ICS
535 | Mt101 .Tos 294518 03-24-93 MultiTOS v.1.01
542 | Atariwx1.Zip 285943 03-27-93 Atari Works 1/2
543 | Atariwx2.Zip 701987 03-27-93 Atari Works 2/2
Fawlty Towers provides an example of typical desktop publishing
products available on such BBSs:
//////////////////////// /// ///////////// /// ///
/// /// /// /// /// /// ///
/// /// /// /// /// /// ///
///////// //////////// /// /// ///////
/// /// /// /// /// ///
/// /// /// /// /// /// ///
/// /// /// /// /// /// ///
/// /// //////////////////////////////////////
\\\\\\\\\\\\\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\
\\\ \\\ \\\ \\\ \\\ \\\ \\\ \\\
\\\ \\\ \\\ \\\ \\\ \\\ \\\
\\\ \\\ \\\ \\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\
\\\ \\\ \\\ \\\ \\\ \\\ \\\
\\\ \\\ \\\ \\\ \\\ \\\ \\\ \\\
\\\ \\\ \\\ \\\ \\\ \\\ \\\ \\\
\\\ \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ \\\\\\\\\\
*^* (#8) ST DTP *^*
### | Filename.Ext Size Date Brief Description
|
1 | Avant .Lzh 171368 02-11-92 ADvant Vector
8 | Dp_E1 .Lzh 343016 03-17-92 Insane!!! Didot-professional DTP [1/2]
9 | Dp_E2 .Lzh 414822 03-17-92 The best! Didot-Professional DTP [2/2]
10 | Siloutte.Lzh 323802 05-11-92 Sillhoutte Vector Graphics/Ray Tracer
11 | Outline .Lzh 193536 05-13-92 Calamus Outline Art
16 | Pgs22_1 .Lzh 322001 07-25-92 Pagestream v2.2 [1/4].
17 | Pgs22_2 .Lzh 379509 07-25-92 Pagestream v2.2 [2/4].
18 | Pgs22_3 .Lzh 317627 07-25-92 Pagestream v2.2 [3/4].
19 | Pgs22_4 .Lzh 428038 07-25-92 Pagestream v2.2 [4/4].
27 | Ara213 .Lzh 329614 08-06-92 Aribesque 2.13
34 | Sl_Enga .Lzh 370940 12-17-92 Calamus
35 | Sl_Eng_B.Lzh 237849 12-17-92 Calamus
36 | Sl_Eng_C.Lzh 318914 12-17-92 Calamus
37 | Convec20.Lzh 311683 01-05-93 Convector 2.0
38 | Cranach1.Lzh 282850 01-05-93 Cool
39 | Cranach2.Lzh 153775 01-05-93 cool
40 | Skyplot1.Lzh 248536 01-05-93 SkyPlot disk 1/2
41 | Skyplot2.Lzh 205589 01-05-93 SkyPlot disk 2/2
42 | Skyplot3.Lzh 323450 01-05-93 Skyplot disk 3? or 3?
43 | Cfned22 .Lzh 17227 01-27-93 Takes Serial #'s off Calamus Fonts
44 | Slmodul2.Lzh 90489 01-27-93 Some Moduals for Calamus
45 | Genus .Lzh 80305 02-01-93 Genus v1.78 - Calamus Fonteditor.
46 | Touchup1.Lzh 362626 02-06-93 Touch Up disk 1/2
47 | Touchup2.Lzh 230762 02-06-93 Touch up disk 2/2
48 | Calpro_1.Lzh 328402 02-24-93 Caligrapher Pro [1/5]
49 | Calpro_2.Lzh 332815 02-24-93 Cal Pro [2/5]
50 | Calpro_3.Lzh 305163 02-24-93 Cal Pro [3/5]
51 | Calpro_4.Lzh 406075 02-24-93 Cal Pro [4/5]
52 | Calpro_5.Lzh 328443 02-24-93 Cal Pro [5/5]
STampede offers Super Nintendo software, so it's not surprising
to find a good many commercial ST games as well:
________ ________ ________
/__ __/\/ _____/\/ _____/\
_______ ______________ \_/ /\_\/ /\____\/__/\____\/
/ \/ \ ___/ / / / /_/__ _\__\/ /\
/ ____/____ ______/\ /_______/\/_______/\/_______/ /
/ /\___\___/ /\_____\/ \_______\/\_______\/\_______\/
/ / / / / / _ ___ __ _ ___
/ /_/_ / / / / //_ /_/ /_// /
\____ \ / / / /_/__// / / //_/ SYSOP
\__/ /\ / / /_________ ______________ _____ \ PAK
/ / // / / __ / \/ __ / __/ __ \/ __/\
_____/ / // / / __ / / / / __/ __/ /_/ / __/\/
/_________/ //____/ /_/ /_/_/_/_/__/\/____/_____/____/\/ CO-SYSOP
\_________\/ \____\/\_\ \_\_\_\_\__\/\____\_____\____\/ SCYTHE
ATARI ST/STE/TT ___ ___ _____ THE THREAT/ICS
CONSOLES SNES/SMD / _ \/ _ \/ ___/\ MR.FLY/ICS
U. S. ROBOTICS 14,400 HST / _ / _ /__ /\/ SLASH/ICS
24 HOURS A DAY /____/____/____/ / BELGARION/ICS
\____\____\____\/ JPC/ICS
*^* (#1) GAMES! GAMES! GAMES! *^*
#### Filename.Ext Size Date Brief Description
1 Ox_Final.Lzh 4958 1-25-93 Crack of OXYD for ALL Tos +codes
printer
2 Ace_Boot.Zip 2482o5 1-28-93 Space Ace II [1/6].
3 Make1.Prg 771554 1-28-93 Space Ace II [2/6].
4 Make2.Prg 8o174o 1-28-93 Space Ace II [3/6].
5 Make3.Prg 757744 1-28-93 Space Ace II [4/6].
6 Make4.Prg 816522 1-28-93 Space Ace II [5/6].
7 Make5.Prg 773416 1-28-93 Space Ace II [6/6].
17 Grandad.Prg 121942 2-5-93 Grandad... code revealed ClockWork/ICS
19 Plan9_A.Lzh 446365 2-1o-93 Plan 9 From Outer Space [1/4] -=ELITE=-
2o Plan9_B.Lzh 694644 2-1o-93 Plan 9 From Outer Space [2/4] -=ELITE=-
21 Plan9_C.Lzh 559989 2-1o-93 Plan 9 From Outer Space [3/4] -=ELITE=-
22 Plan9_D.Lzh 46o123 2-1o-93 Plan 9 From Outer Space [4/4] -=ELITE=-
23 Bat2A.Lzh 494437 2-11-93 BAT II- Disk 1/5 in English
24 Bat2B.Lzh 513453 2-11-93 BAT II- Disk 2/5
25 Bat2C.Lzh 453112 2-11-93 BAT II- Disk 3/5
26 Bat2D.Lzh 533968 2-11-93 BAT II- Disk 4/5
27 Bat2E.Lzh 479446 2-11-93 BAT II- Disk 5/5
28 Ics_Bat1.Lzh 519321 2-11-93 BAT 2 Disk 1/5 *german* +-=I.C.S=-+
29 Ics_Bat2.Lzh 53322o 2-11-93 BAT 2 Disk 2/5
3o Ics_Bat3.Lzh 46437o 2-11-93 BAT 2 Disk 3/5
31 Ics_Bat4.Lzh 542978 2-11-93 BAT 2 Disk 4/5
32 Ics_Bat5.Lzh 5o5595 2-11-93 BAT 2 Disk 5/5
36 Ics_Sp21.Lzh 487641 2-13-93 Space Crusade II 1/2 cracked by -=ICS=-
37 Ics_Sp22.Lzh 39834o 2-13-93 Space Crusade II 2/2
38 Bat_Ii.Zip 1243o 2-13-93 BAT II Complete docs
41 Ics_Dl3o.Lzh 77o5o8 2-14-93 Dragons Lair III The Curse Of Mordead
42 Ics_Dl31.Lzh 585584 2-14-93 Dragons Lair III 2/8 -=ICS=-
43 Ics_Dl32.Lzh 432o33 2-14-93 Dragons Lair III 3/8 -=ICS=-
44 Ics_Dl33.Lzh 451928 2-14-93 Dragons Lair III 4/8 -=ICS=-
45 Ics_Dl34.Lzh 517527 2-14-93 Dragons Lair III 5/8 -=ICS=-
46 Ics_Dl35.Lzh 5o9381 2-14-93 Dragons Lair III 6/8 -=ICS=-
47 Ics_Dl36.Lzh 6o3781 2-14-93 Dragons Lair III 7/8 -=ICS=-
48 Ics_Dl37.Lzh 612524 2-14-93 Dragons Lair III 8/8 -=ICS=-
51 Galaxian.Lzh 163o72 2-15-93 Galaxian
52 Cyberlzh.Lzh 6276o5 2-16-93 Cyber Assult [ZX/ICS] *READ FULL DESC*
56 Ics_Cybr.Lzh 168957 2-21-93 Cyberdome Hoverjet Simulator -=ICS=-
58 Rebelion.Zip 33119o 2-22-93 Rebellion D'Bug release
64 Ics_Nigl.Lzh 763445 2-28-93 Nigel Manesll cracked by Belgarion/ICS
65 Ics_Gob1.Lzh 537814 3-2-93 Gobliins II *THE REAL ENGLISH VERSION*
66 Ics_Gob2.Lzh 65o934 3-2-93 Gobliins II 2/3 -=ICS=-
67 Ics_Gob3.Lzh 6o82o1 3-2-93 Gobliins II 3/3 -=ICS=-
72 Grav2.Zip 247252 3-7-93 Grav II
74 Kil_Mach.Lzh 283892 3-7-93 Killing Machine
98 Ics_Civo.Lzh 322966 3-19-93 Civilization 1/4 cr. by Belgarion/ICS
99 Ics_Civa.Lzh 328o17 3-19-93 Civilization 2/4 -=ICS=-
1oo Ics_Civb.Lzh 33o664 3-19-93 Civilization 3/4 -=ICS=-
1o1 Ics_Civc.Lzh 3o3685 3-19-93 Civilization 4/4 -=ICS=-
1o2 Civiliz.Zip 51863 3-19-93 Civilization full docs
1o3 Civhints.Zip 15878 3-19-93 Civilization hints and tips
1o4 Frank.Prg 1461oo 3-2o-93 Frankenstein CyniX release
1o5 Crys_A.Lzh 23447o 3-2o-93 CRYSTAL KINGDOM DIZZY Disk 1/2
1o6 Crys_B.Lzh 532o62 3-2o-93 CRYSTAL KINGDOM DIZZY Disk 2/2
114 Sleep1.Lzh 781519 3-27-93 Sleep Walker [1/3] *-CyniX!-*
115 Sleep2.Lzh 774173 3-27-93 Sleep Walker [2/3]
116 Sleep3.Lzh 8o4o2o 3-27-93 Sleep Walker [3/3]
I must stress that this is just a small sampling of the kinds of
offerings we found -- and of the boards we investigated. Most
boards (pirate and legitimate) have separate file areas for
different kinds of products (MIDI, DTP, Applications, Utilities,
Games, Docs, Graphic Utilities, etc.). A BBS which offers a
wealth of Utilities, for example, is likely to have a strong
database in other file categories as well. Please note that
these are just partial lists from a single file category on each
of these boards. A truly comprehensive listing would make this
article intolerably huge.
The IAAD's membership total fluctuates, but right now we are
holding steady around the 60-member mark. Products owned or
distributed by nearly every single member were found on one BBS
or another during our investigation; some of our members were
victimized by every pirate board we called.
The self-confessed pirate Troed says this about piracy:
~ I NEVER buy a program without knowing if it is what I ~
~ want .. the ShareWare principle .. but how do I check ~
~ that with commercial software? By pirating them, using ~
~ them .. if I like them, I want the original + manual .. ~
~ I buy it. ~
-- Troed on the F-Net, ST Report Conference
but contradicts himself a paragraph later:
~ I bought my STe for $800 one year ago, if I were to ~
~ registre/buy [sic] all the soft I use I would have to ~
~ pay something around $10000 .. I can't afford that. ~
--Troed on the F-Net, ST Report Conference
On the one hand, Troed insists that he merely tries out his
pirated software prior to purchase -- and buys it if he wants it.
But on the other hand, he _uses_ $10,000 worth of commercial
products and _cannot_ afford to pay for it. I would concede that
it is possible that some software thieves do use their pirated
downloads in the same way that honest people use commercial demos
and shareware...some, but not many.
Developers are well aware of "software collectors". These are
folks who simply must have a copy of everything, whether it meets
their needs or not. The majority of software collectors want the
real thing, manual and all. It's our experience that, because
pirate board users have to pay with an upload (or with money) for
each and every download, few will bother to download programs they
don't really want, need, and plan to use. Because of this, the
majority of downloads from pirate boards must be viewed as lost
potential sales. And those few pirates who are collectors or who
find they don't need a particular file will hang onto it and later
share it with others in order to earn upload credits.
We found Warp 9 on nearly every pirate board we called. CodeHead
had purchased the QuickST kernal used for Warp 9 from Darek
Mihocka of Branch Always Software, and Charles Johnson worked
very hard to refine and extend it in order to deliver to us the
indespensible utility Warp 9 has become. Like many CodeHead
products, Warp 9 is so easy to use that the manual is not needed
for basic use. Warp 9 sells for $44.95; a purchase like this
wouldn't put many STers in the poorhouse. But how many people
downloading this program from a BBS would go to the trouble of
ordering it after "testing it out"?
A good example of the speed at which pirates can destroy the
sales potential of a new release is shown by the upload date on
this entry found on the Rats Nest (the notation "Off" indicates
that this file has been removed, probably when a later version
superceded it):
336 | Warp9370.Zip --Off-- 09-13-92 Warp 9 v. 3.70 - Glendale Release
CodeHead released this version on Saturday, September 12, 1992 at
the Glendale AtariFaire. By Sunday, before the second day of the
show was even over, it was already in distribution by pirates.
What about more expensive products? At $795, Calamus SL by DMC
is one of the pricier offerings on the North American market.
It's a high-end DTP package requiring or benefitting from an
additional investment in sophisticated Atari hardware,
accelerator boards, graphics cards, and a large-capacity hard
drive.
~ It was bad enough to discover Calamus SL on just ~
~ about every single "pirate" board that was ~
~ investigated; it was worse to discover a program ~
~ written specifically to strip out our serialization. ~
~ But the real kicker was to discover our entire 600- ~
~ page manual available for downloading in ASCII. The ~
~ people that run these boards are criminals and deserve ~
~ to be put in jail. Their "customers", those that ~
~ frequent these boards, are, at best, petty thieves. ~
~ What disgusts me the most is how many of these ~
~ "customers" would never consider themselves thieves ~
~ even though they are stealing from me, from my family, ~
~ from my company, and from the Atari community at large. ~
--Nathan Potechin of DMC
Since the manuals for such extensive programs are truly required
in order to make good use of the product, software thieves will
actually go to the trouble of typing them in or copying them with
OCR software (which is also conveniently available on these
BBSs). Even when a manual is indispensible, the software pirate
may have no need to actually purchase the program in order to
make full use of it.
Expensive products get that way because of development and
production costs. While the raw materials in a typical software
package may cost only a few dollars, it takes much more than
pieces of paper and a disk to make a commercial product. Calamus
SL cost DMC hundreds of thousands of dollars for development
staff alone, _not_ counting expenses related to the writing and
production of the manual, packaging, marketing, duplication,
overhead, etc. A share of this expense must be borne by everyone
who uses the program in order to recoup costs and keep
development going. When people use the program without paying
for it, this simply does not happen.
Many ST development firms are essentially one-man shows; the
programmer is also the accountant, the publisher, the editor, the
secretary. Developers like these are apt to take software theft
very personally and feel the impact very intensely. One
developer's reaction to his product's proliferation on pirate
boards began: "I used to be against captital punishment..."
~ ...It hurts, and I don't mean that strictly in a ~
~ financial sense, either. We've tried hard, I mean ~
~ _really_ hard, to provide quality software at a ~
~ reasonable price coupled with a customer support ~
~ policy that is second to none...The pirate mentality ~
~ couldn't care less about us and our ideals of customer ~
~ service. And that hurts. ~
--John Hutchinson of Fair Dinkum
~ It's very discouraging to me to see illegal copies of ~
~ Flash II appear on these so-called pirate boards. I ~
~ wonder if the folks that steal our program understand ~
~ the length of time it took to produce it? Flash II ~
~ ver. 2.0 took 3 years to create and spent another year ~
~ in beta test. Version 2.1 took close to another year ~
~ to modify and test. We're practically giving it away ~
~ as it is! ~
--John Trautschold of Missionware
Word Perfect has been public about having dropped future
development for the ST and about the reason for that decision:
low sales. It can't be a coincidence that Word Perfect for the
ST was on many boards we called.
I doubt that STers are any less honest than owners of other
computer brands, but ours is a small market, and piracy here can
hurt developers much more than on more popular platforms. If a
platform has 10 million users and 90% of them are pirates, the
software developers still have 1 million potential buyers. On a
platform like the ST, with only a few hundred thousand users at
most by comparison, even if _no_one_ stole software, developers
would still only have a few hundred thousand potential buyers. In
reality, only the most popular products are likely to sell in
quantities greater than 1000 units in North America. In the case
of a coveted and respected multi-platform application like Word
Perfect, if the program had not been pirated so many times over,
the sales figures might well have been sufficient to justify
further development for the benefit of ST owners.
~ I talked to a couple of shops...and...asked if they ~
~ were interested in carrying any music education stuff. ~
~ They said that they would love to carry some but could ~
~ not sell any education, music, or game software due to ~
~ the fact that if anyone wanted a copy they would pirate ~
~ it...The only thing they have real success at selling ~
~ is applications due to people wanting a printed manual + ~
~ phone support...I didn't make a sale. ~
--Jim Collins of chro_MAGIC
There's a small profit margin in selling computer hardware;
dealers depend on income from software sales to sustain their
businesses. In every area where large pirate boards flourish,
Atari dealers have closed their doors in spite of a comparatively
large installed base of users. "It got to the point where I sold
only magazines," one former dealer complained. "They'd buy the
magazines to find out what programs were worth downloading."
Honest users in these areas are likely to grumble about the loss
of the dealers; pirates grumble, too, because their link to new
hardware, service, and magazines has been lost. Every dealer
lost means fewer hardware sales for Atari, fewer software sales
for developers, fewer new members for users groups, fewer
vendors and attendees at fewer shows.
With the Atari user base in serious decline, it is more important
now than ever that piracy not be tolerated. Make no mistake
about it: pirated software is _not_ free.
~ Wait-wait-wait... There is nothing positive piracy does ~
~ for a computer company. Nor is it anything BUT negative. ~
~ I look at it like this...We can always blame Atari for ~
~ not advertising, but if there were no Atari pirates, ~
~ more software would have been sold, making the computer ~
~ more viable for software companies, which in turn makes ~
~ the computer more desirable for a user. So, basically ~
~ what I'm saying is, the people who love Atari the most, ~
~ (us) are the same people who have been killing it for ~
~ years. And there was a time when Atari was big ~
~ EVERYWHERE...There was even an Atari dealer here in my ~
~ little town of Lake Wales! That's where I bought my 400! ~
-- Fruit-WARE Man on Excalibur II BBS
Ultimately, we all pay for piracy one way or another: Atari,
developers, dealers, and users -- even the pirates.
2. How it Works
For the uninitiated, let's define some terms. A "pirate board"
is a Bulletin Board System (BBS) on which copyrighted commercial
files are offered to users for downloading without compensation
for the copyright holder. Some pirate boards are devoted to this
activity almost exclusively, and sysops running these boards
accept only fellow pirates as users. Other pirate BBSs have
pd/shareware files areas in addition to hidden commercial areas;
honest users of such boards may have access only to the
pd/shareware sections and may be completely unaware of the pirate
nature of the board.
Software pirates have a unique lexicon to describe their
activities. Users allowed into the commercial areas have been
granted "elite access". The commercial files are referred to as
"warez"; elite file areas on some BBSs include sections on such
related topics as pornography, defrauding long distance carriers,
and creating one's own Super Nintendo Entertainment System
cartridges by burning the software into EPROMs. Callers who take
without giving back (download without uploading) are called
"leeches", and downloadable files may be referred to as
"leechables". Defrauding the phone company by using illegal
techniques to make long distance calls is a mainstay of the art of
"phreaking". "Cracked" versions of programs have the copy-
protection and/or registration and serial numbers removed. "0
day" is the day a commercial product is officially released. Many
pirates have also adopted a manner of writing which flaunts the
rules of our language, such as swapping lower and upper case,
substituting "z" for "s" and "ph" for "f", etc.
Successful software theft has two basic requirements: a dishonest
person willing to give away a copy of a program he has purchased
-- and another dishonest person willing to accept it. When this
activity takes place on a Bulletin Board System, a given copy can
be distributed rapidly from BBS to BBS, from user to sysop to
user, all over the world. One person's willingness to give away
that first copy can lead to its possession by literally thousands
of others. Pirate boards succeed because there are many people
willing to give or take the copies -- and because the sysop uses
strategies calculated to maintain and escalate their involvement.
The pirate sysop sets up his BBS, invests in a high-speed modem
and phone lines, and advertises his number on other BBSs. When
the calls start coming in, the sysop scrutinizes each would-be
user and decides whether or not to validate the new account and
what level of access to allow.
~ I've seen credit applications that made more sense. ~
-- Sandy Wilson on GEnie, describing a brief encounter
with the new user questionnaire on a BBS running
RATSoft ST
~ Do you believe in the free distribution of software be ~
~ it copyrighted or not? ~
-- Fawlty Towers BBS, from the new user questionnaire
The sysop has two major responsibilities: to keep the board
running and to ensure security. He requires full disclosure from
his callers. He wants his callers' real names, real addresses,
real phones, but he is not likely to reveal his own name or
location. There is usually an elaborate questionnaire. The
sysop may call the new user's voice number to check its
authenticity. He may do thorough background checks with other
information the caller has provided. He may keep a blacklist of
uncooperative or non-productive callers (leeches) and share it
with other sysops.
~ NEW USERS: IF YOU DON'T DO A NEW USER UPLOAD YOU WILL NOT ~
~ GET ACCESS. IF YOU DON'T KNOW WHAT A NEW USER UPLOAD IS ~
~ YOU DON'T BELONG ON THIS BBS. ~
-- PAK on STampede BBS
The callers themselves supply the warez which keep the board
active. They earn credits for uploading, and apply those credits
toward future downloads. Pressure to upload a file often begins
immediately after a new user's account is validated. It may even
be part of the new user questionnaire prior to validation.
Typically, a New User Upload is required before the new user is
given full access, including the ability to download. Sometimes
the sysop will allow the new user to view the files area on the
BBS in order to entice the caller into uploading a commercial
file. On other boards, the commercial files area will stay
completely hidden from the new user until after he has proved his
worthiness -- and incriminated himself -- by sharing a commercial
program of his own.
Like a kid in a candy store, the caller wants one of everything,
but to get it, he must pay the price. So he looks at his
collection and chooses a program he hopes will meet with the
sysop's approval. Merely uploading the program may not be enough
to gain elite access; the upload may be judged on how new it is,
whether the board already has a copy, or even whether the program
chosen is useful or well-reviewed.
~ You Understand that you MUST keep a 'reasonable' file ~
~ Upload/ Download ratio And "K-Byte" ratio or your ~
~ Access WILL be Lowered and maybe Deleted!! ~
-- Gold Nugget BBS, from the new user questionnaire
~ Donate! King Arthur has a very reasonable donation ~
~ policy that makes it easily affordable to have ~
~ unlimited download credits...It's so much fun on the ~
~ Atari (and soon to be Falcon) scene now that there's ~
~ no excuse for you to miss out! ~
-- Little Flea on Excalibur II BBS
~ ...I started caring, and so the users that DID not post, ~
~ called within 30 days, and sent new files, got kicked ~
~ off.. YOU DONT [sic] GET NOTHING FOR FREE!!! ~
--The Conjurer, sysop of Outer Planes BBS, on the F-Net,
Elite Underground Conference
The sysop uses his warez to entice callers, but he may also
perfunctorily ax callers who violate his rules or confidentiality
requirements. The threat of being cut off from the source keeps
the callers uploading on a regular basis. The BBS software keeps
track of a user's download/upload ratio; ratios that are
unacceptably high on the download side may result in censure by
the sysop or loss of access. If a user has no files of value
to offer the sysop, he may be able to gain privileges by sending
in a "donation". Some sysops forego the euphemisms and announce
flatly that they charge for greater access.
~ Does anyone have Trump castle? Im [sic] starting to run ~
~ thin on other boards for credits. I would rather save ~
~ them for the 0 days stuff. If you have it could you ~
~ please u/l it. ~
--Shadow Master on London Smog BBS
In order to keep his account current, the user may be forced to
call in every few weeks; each call results in a deduction from
the user's credit total, so he's back looking for new files to
upload. If the caller gets those files from another BBS, he'll
get caught up in a never-ending cycle of uploads and downloads in
order to keep his accounts active on all the boards he calls.
Occasionally, he may have to buy a program outright in order to
upload it. The caller is reminded of any deficit in his credit
total every time he calls and may be denied access to certain
areas until the total is in the black.
~ Well, after being away from the BBS scene for awhile, I ~
~ have finally found an Elite BBS! (Thanks PAK! :). Anyhow, ~
~ please send me BBS #/NUPs for boards that carry elite ~
~ Macintosh or SNES console stuff. ~
-- Nostrildomus on STampede BBS
Some pirate-only BBSs won't allow any but the most serious of
callers. They may require all users to have 9600-baud modems or
greater. They may limit 2400-baud callers to less desirable
calling hours. Some require would-be callers to announce their
first upload before being allowed access; the sysop then decides
whether or not this caller will be a valuable contributor on that
basis. Some require referrals from other pirate boards. A twist
on this is the New User Password, spread from user to user.
Boards like the Computer Connection will ask for this "NUP" in
the new user questionnaire. If the caller cannot provide it,
access is not granted. Most boards ask at the very least for the
names and numbers of the boards the new user already calls; a new
user who provides incorrect numbers or fictional board names --
or who lists only legitimate BBSs -- may be denied access.
The sysop's users provide his warez, and the sysop is a direct
beneficiary. Like a golden goose, a single program keeps giving
and giving. One user paid for it once, but the sysop can
distribute it to other users in trade for additional warez or
money again and again. The current callers spread the word about
the BBS's offerings to others, thus increasing the number of
users frequenting the board and providing uploads. Some boards
encourage this by offering download credit for user referrals.
While operating a BBS is the least labor-intensive way to
accumulate warez, it may not be the most efficient way to make
money. After all, there's a whole market of non-modem users out
there just waiting to be tapped. For a tidy fee, sysops may sell
copies of their warez via mail order; through schemes like these,
users can obtain pirated software without the costs of a high-
speed modem and long-distance calls and the pressures of the
upload/download ratio.
3. Paranoia Strikes Deep
All BBS sysops, even the most responsible, put themselves at some
risk of legal complications due to messages, e-mail, and files
posted by users. It takes a special motivation for a sysop to
actually promote and encourage an illegal activity which increases
his risk and liability. For some, money or software may be
sufficient motivation. Others may make up for social inadequacy
in their offline lives by taking a leadership role online. And
many of these seem to enjoy the power they have over their users.
Like schoolyard bullies, they control and police their turf with
heavy-handed threats and zero-tolerance judgments, all with the
protection afforded by their anonymity. On their own BBSs, they
call the shots -- and no caller can challenge them on that.
~ """"""""""""""""""""""""""""""""""""""""""""""" ~
~ " Happy Hideaway BBS is protected under the " ~
~ " FEDERAL COMMUNICATIONS ACT of 1986 " ~
~ """"""""""""""""""""""""""""""""""""""""""""""" ~
~ Duplication, Re-transmission, or Distribution of any ~
~ part(s) of this BBS is forbidden without the expressed ~
~ written permission of the sysops. ~
--Happy Hideaway BBS
~ Re-transmission of material from this BBS is strictly ~
~ forbidden without written permission of the Sysop(s)!!! ~
-- The Ghetto! BBS
Some sysops are very protective of their warez. They want their
boards to be the best, to have the most highly-prized files, to
attract the greatest number of active users. The sysop may claim
that his board is protected by international copyright laws; that
is, he has a copyright on the _collection_ and he has a right to
control the distribution of any part of it. A user may download
from his BBS, but he'd better not find that user uploading the
same program to a competitor. In other words, the sysop contends
that he has exclusive rights to the black-market product!
~ "I agree with these conditions, and I am not a ~
~ member/employee of ANY authority like the Police, or ~
~ anything like that, nor am I an employee of ANY type of ~
~ non-public domain software company, Telephone company ~
~ security or some anti-software piracy organization. I ~
~ hereby legally bind myself to this, by answering YES ~
~ in [sic] at the prompt". ~
-- The Ghetto! BBS
~ This BBS is a PRIVATE SYSTEM. Only private citizens ~
~ who are not involved in government or law enforcement ~
~ activities are authorized to use it...access to this ~
~ system by ANY law enforcement agency ( Federal, State, ~
~ Local or other), software company, telephone company, ~
~ government agency, or anyone affiliated with the above ~
~ is not allowed. ~
--London Smog BBS
~ Are you registering on this BBS with the sole purpose ~
~ of entrapping or aiding in the entrapment of the SysOp? ~
-- DarkWorld BBS
~ "I am not part of ANY law enforcement agency or an ~
~ employer/employee of any NON-Public Domain software ~
~ company, or software publisher." ~
~ ******************************************************** ~
~ * By typing YES at the PASSWORD prompt you LEGALLY * ~
~ * BIND yourself to the provisions listed above. * ~
~ ******************************************************** ~
-- Outer Region BBS
Sysops are well aware of the illegal nature of their activity,
and they may go to great lengths to protect themselves from legal
action. Most boards post disclaimers about the sysop's
responsibility for the activities which take place there. Others
try to compromise the submissability of legal evidence by
requiring investigators to reveal themselves.
~ You have failed to answer a security validation ~
~ question properly. ~
--Paris BBS
In the midst of such paranoia, it's not surprising that most
pirate BBS callers and sysops use pseudonyms. Frequently a user
goes by the same pseudonym on every board he calls so that his
online friends can identify him, send him e-mail, etc. We've
identified many pseudonym-users in spite of their attempts to
hide their identity. Here are a few examples of the thousands of
aliases used by callers on pirate boards. They know who they
are. And you may be surprised to find that _you_ know who they
are, too:
RAHMAN Clockwork Orange Stsoft
Elof Zaphod Beeblebrox Troed
Hack-Hack KG mr.fly/ics
Looms Hanzon Horizon Sparky
Yellow Lightning PAK slash/ics
The Piper The Parsec The Shamus
Mouse Master Overlord RoadKill
The Missing Link Nightmare Deadhead Ed
Little Flea the threat/ics jpc/ics
belgarion/ics Disease Factory Frosty
Sledge Archiver Spy Guy
Traveler The Dragon Lord Frogger
Shadow Skinhead rhys/ics
Sparky KRS-ONE Ice Pirate
Clueman Arthur Dent DANE
Goat Slayer Norstar Speed Demon
Time Warp Snow Queen Mr.terry
Who are the people who go by these aliases? Who calls pirate
BBSs and who runs them? A 16-year-old high school junior whose
supply of British games multiplied out of control when he added a
high-speed modem to his system? Yes. A 32-year-old father of
two who in all other ways is the very model of integrity? Yes.
The good old boys who bring crates of software to swap at your
users group meeting? You know it! A 50-year-old con artist who
makes thousands of unreported (i.e., tax-free) dollars every year
by convincing others to give him programs to sell? Absolutely.
Several hundred software thieves are so active and on so many
BBSs that it's hard to imagine that they have time for anything
else. The thousands of more casual pirates may have access to
only a few boards and call only a few times a month. And whether
a specific pirate BBS has 50 regular users or 500, its phone
lines are constantly busy.
4. Organized Crime
As with other criminal activity, the big players in software
theft have formed alliances to share files, blacklists, message
networks, and other information. There are dozens of these
organizations, some international in scope. For example, The
Elite, with world headquarters in the Netherlands, is
headquartered here by the Outer Region BBS in Colorado and
Dragon's Pub in Quebec. The Syndicate (TSC) has representative
BBSs on three continents and in both hemispheres; the Happy
Hideaway in Florida serves as its Eastern US headquarters and
Outer Region as its Western base, while the Shire BBS in Chile
and the Eagles Nest and Slime City BBSs in Sweden provide an
international link.
Cracking organizations are devoted expressly to undermining copy-
protection and registration strategies used in commercial
programs. Outer Planes in Ohio is the world headquarters for the
cracking ring known as CyniX. STampede, in Plant City Florida,
is the International Cracking Society's (ICS) US headquarters and
features its cracked warez, but these rapidly spread to other
BBSs across the country and so can be found on many other boards
as well. Cracking rings are often multi-platform in scope;
individual crackers will work on getting around the copy-
protection on the platform of their choice. They'll share
cracking tips with and seek advice from ring members working on
other platforms. The Pompey Pirates cracking ring, headquartered
on the Paris BBS in New York City, reportedly has just one
cracker, who goes by the name of Alien, working routinely on the
ST, while cracking rings like ICS include many ST enthusiasts.
ICS, MCA, Section 1, CyniX, and other crackers are very well-
connected, using ultra-high-speed modems and multi-frequency
dialers to call all over the world without long distance fees.
It's not unusual to find a cracker from one ring visiting the
headquarters of another and sharing warez. Cracking rings
compete vigorously for the first crack of "0 day warez" (brand
new releases), for the most successful crack, for the toughest,
etc.
Pirate boards have aligned themselves with legitimate networks as
well. Many of the BBSs on which we discovered commercial files
areas are linked to the F-Net -- and, of course, so are plenty of
responsible BBSs. For example, according to a CrossNet Conference
Node Listing, The Time Warp BBS (F-Net node 99) serves as the lead
node for the "Elite Underground" F-Net conference, which also
includes Starlight BBS (node 287), Darkworld BBS (node 305), Outer
Region BBS (node 469), Steal Your Face (node 489), Outer Planes
(node 558), Gold Nugget BBS (node 622), London Smog BBS (node
632), Million Dollar Saloon (node 639), Speedy's Raceway (node
689) and H.B. Smog (node 712). According to another CrossNet
Conference Node Listing, The Gold Nugget serves as the lead node
for The "Pompey Pirates Elite" (not directly associated with the
Pompey Pirates cracking ring mentioned above) F-Net conference;
The Prairie Chip II BBS (node 45), The Blackhole (node 612), The
Temple of Doom (node 595), and Spider-man's Web (node 711) are
among the 9 BBSs involved in this conference. The "Upper Echelon"
F-Net conference ties US and Canadian boards by serving callers on
the Gold Nugget in Ohio, Steal Your Face in New Jersey, Space
Station BBS (node 248) and London Smog in California, Million
Dollar Saloon in Texas, Paybax BBS (node 307) in Delaware, and
Aardvarks from Mars (node 38) and Dragon's Lair (node 87) in
Ontario.
Conferences of this kind allow pirates from great distances to
"get to know" each other, to exchange files as well as messages,
to solicit calls to their favorite BBSs. Participation in these
conferences establishes an online identity; a pirate recognized
from his posts on one node of a conference is likely to be
accepted without question when logging on as a new user on
another node in the same conference.
There are also smaller F-Net-related conferences for pirating
discussions. For example, according to a CrossNet Conference
Node Listing, a Local Area Private Elite Conference with a lead
node at the Outer Region links with three other BBSs in Colorado,
including RingWorld (node 643), The Grave Diggers Tomb (node
186), and BILINE BBS (node 423). Outer Planes is the lead node
for the 4-node "Console" conference, a message thread devoted to
topics related to pirating SNES and other game console warez.
5. Ill-Begotten Goods, Fawlty Filez...
Pirating hurts the entire ST community by discouraging third-
party development, closing down dealerships, and raising software
prices. But is it a "good deal", at least in the short run, for
the pirates themselves? Let's ask 'em:
~ Mock me not! Civilisation is great.. Except it is ~
~ cracked poorly...Can't win with the Cynix crack... ~
--Mark Anthony on Outer Planes BBS
~ ...ok, then how do you save????? I love this game, but ~
~ I dont know how to save it.. ahhh ~
--The Conjurer on Outer Planes BBS
~ Bad news... using UVK, just found out that the disk has ~
~ a VIRUS on it called the 'DIRECTORY WASTER'. After ~
~ twenty copies of it are made, it wipes out your disk. ~
~ Use UVK to kill the virus, and be careful with swapping ~
~ disks around this one. ~
--Sparky on Outer Planes BBS
~ Has anyone set up Speedo GDOS , I seam [sic] to run ~
~ into probles .. [sic] ~
--The Mixer on Time Warp BBS
~ Can someone please send me a working ASCII import ~
~ module for pagestream. I cant seem to get TEXT files ~
~ to import correctly. Either the text doesnt [sic] ~
~ fill the full width of the screen or I get no ~
~ paragraphs(ALL run together) ~
--Red Dragon on Time Warp BBS
~ Has anyone got it to work? I tried to get it to run on ~
~ a Floppy based 520ST (1meg) and on my TT030 and on both ~
~ I got 4 bombs! ~
--The Parsec on Rats Nest BBS
~ Has anyone gotten this to load? My install disk just ~
~ freezes. Any ideas? ~
--Bullshot Xxx on the F-Net, Upper Echelon Conference
~ ...my UTIL_2.PRG doesn't work, it was corrupt in the ~
~ original download... ~
--Jason Elite on the F-Net, Upper Echelon Conference
~ For some reason I can't get other vers. of TOS to boot ~
~ from the HD without sticking a disk in with the HD boot ~
~ in the Auto folder. ANYONE know how I can get TOS 1.4 ~
~ and 1.0 to off the HD and recognize the hard drive ~
~ without sticking a disk in?...It's just a hastle [sic] ~
~ to use the Hard Drive when you have to boot from disk ~
~ first... ~
--Ice Pirate on Rats Nest BBS
~ I have the two lharc's of Epic, and after lharc, they ~
~ come out to 900+K MSA files... Well, MSA won't format ~
~ a disk large enough to put them on.. What kind of ~
~ formatting program can I use to format my disks that ~
~ large.. Or can I? ~
--Cronos on Fawlty Towers BBS
~ I was wondering if anyone else has been messing with ~
~ the latest Cubase 3 crack. I've had some success and ~
~ have even used the SMPTE options via my C-Lab ~
~ Unitor-N box, but when I try to use the "edit" functions ~
~ more than a few times (sometimes even the first try), ~
~ I get an "Internal Error" message and the program locks. ~
--MIDIMUCK on Fawlty Towers BBS
~ I wouldn't use it if your [sic] working on a paying gig, ~
~ Just cause It's unreliable, especially when in SMPTE lock. ~
~ I've had this same problem recently, I ended up x-fering ~
~ the stuff over to another sequencer. ~
--KG on Fawlty Towers BBS, replying to MIDIMUCK about the
cracked version of Cubase 3
~ Yes, there are 2 different cracks of version 3.x, none ~
~ of them working properly. The best Cubase crack I know ~
~ is version 2. I heard though that it gives problems ~
~ when you use Midiex... ~
--X-tian on Fawlty Towers BBS
~ yeah, I would [sic] do any real work on it. I lost 2 ~
~ songs with it. ~
--KG on STampede BBS, replying to a message about a
cracked version of Cubase
~ Has anybody had a problem with the Cynix crack of ~
~ Frankenstein? I haven't been able to get it to work on ~
~ either of my computers. It bombs badly. ~
--PAK on STampede BBS
~ I've been having problems with some files I D/Led ~
~ (Ultima 6 is flaky and Lost Vikings doesn't work at ~
~ all). ~
--Nostrildomus on STampede BBS
~ I sure wouldn't even attempt any 'serious' work project ~
~ with that 'crack'... ~
--Sparky on STampede BBS
~ Do you have a version of NEW ZEALAND STORY which works ~
~ past the first city? ~
--The Shamus on STampede BBS
~ HEY!! Will someone PLEASE UPLOAD a FULLY working version ~
~ for KOBOLD 2 I've had so many different version from ~
~ different people and they are ALL bad !!! ~
--Sidewinder on Outer Region BBS
~ I have an elite copy of Calligrapher and it doesn't ~
~ support ASCII text files, so you can only work with ~
~ .CAL files (files made by Calligrapher) Also it doesn't ~
~ have keyboard equivalents (a pain) ~
--Frogger on the F-Net, Elite Underground Conference
Pirates aren't entitled to support from commercial developers and
are often working without any documentation, so they are very
likely to encounter problems with their warez.
The real version of Calligrapher, for example, has several import
and export options, including ASCII. It has configurable keyboard
commands. Frogger's version might have been hacked in a way which
destroyed these capabilities, or he simply might not know how to
take advantage of them because he has no documentation or support.
When pirates spread disinformation about the warez they use,
people may think they are speaking out of knowledge of the actual
commercial release. In this way, a pirate's ill-informed comments
about products can discourage sales to others.
The software they use -- like the sysops and other pirates with
whom they associate -- cannot be trusted. Cracked software is
prone to be flakey. And the same type of people who think it's
acceptable to crack and steal software are also the type who write
viruses and unleash them on others, so even files which haven't
been cracked must be viewed with suspicion.
In addition to the fear of loss of access, the pressure to upload
or pay, lack of official and informed support, an online
environment of suspicion and paranoia, and abandonment of ethical
principles, pirates must also contend with software that is
unreliable and potentially dangerous. The pirate pays a heavy
price. Pirated software is _not_ free -- for anybody.
6. Phreaking, Copyright Infringement, Pornography, and the Law
The users pay the sysop of a pirate board, either by sending a
check for greater access or by offering up files they've
purchased in exchange (or both). Heavy users must invest in
expensive hardware, such as high-speed modems. And for many
callers, there's a long-distance charge.
~ If any of the USA callers has MCI you can put this bbs ~
~ on you [sic] Friends and Family list and save yourself ~
~ about 3 cents a minute. Just say that the phone number ~
~ is for a data line and they usually don't ask anymore ~
~ questions. ~
-- PAK on STampede BBS
~ ...there are high speed users around, and considering ~
~ other really good Atari boards are out of state, $.25 ~
~ per call is as cheap as anyone could ask for. I'm ~
~ starting to think "elite" is dead in the Tampa area, ~
~ as far as Atari is conserned [sic]. ~
--PAK on Master Lazarus BBS, explaining the poor
attendance rates by local pirates on local BBSs
~ Wanted... original suppliers ~
~ graphic artists ~
~ another support bbs ~
~ calling card suppliers ~
--Quattro of the CyniX cracking ring on the F-Net,
Elite Underground Conference
~ When I hit a special key, my Bluebox plays a little ~
~ melody..... ~
-- STampede BBS
~ I call the whole world for the same price. ~
-- Troed on Rats Nest BBS
Not all those living far from a BBS pay long distance charges,
however. Some boards share calling card numbers (belonging to
innocent victims, presumably) so that the phone company will
charge the users' calls to someone else. Sometimes users as far
away as Chile or Sweden manage to make calls at no cost by
fooling and defrauding their long distance carriers. In the old
days (defined here as the 70's), this was achieved by building a
"bluebox" and installing it in one's phone line. Today, it's
easily done in software. The caller's ST simulates the tones
recognized by the telephone system. Calls are routed all over
the world and back, typically through South America, in order to
confuse the system and avoid detection. This activity is just as
illegal as copyright infringement, and it's also better
understood as a crime by police. Many times a pirate board is
closed down not because of the illegal transfer of software, but
rather because information on blueboxes was available for
download.
~ Word is around town that there are feds looking for ~
~ Pirate BBS's. I know weather to belive [sic] it but ~
~ it could be time for another big bust like there was ~
~ four years ago. Supposedly a Big BBS in OHIO just got ~
~ nailed real bad!. Freaky as hell. ~
--Mind Eye on Thieves Guild BBS
There are, in fact, many approaches to shutting down pirate
boards. Copyright infringement is one obvious track. The
Software Publishers Association is a watchdog agency which works
with the FBI to shut down large-scale BBS operations. There are
legal departments at major computer, game machine, and software
companies devoting time and effort to this task. There's the IRS
connection for unreported caller "donations". Some boards come
down because of the availability of pornography. There are a
variety of criminal laws related to activities common on pirate
boards, and, especially in cases of copyright infringement, civil
law may offer the most effective route to compensation for the
victims.
When a board is busted by the authorities, the related equipment
and property is usually seized. Any records of callers, caller
donations, etc., are seized along with that equipment. Callers
could be charged with conspiracy. For this reason, it's not wise
to have one's real name, address, and real phone show up in the
records of a pirate board, even though the sysop adamantly
insists upon it and uses verification checks to enforce it...
7. Spotting a Pirate Board
~ Many people may not realize that software pirates cause ~
~ prices to be much higher, in part, to make up for ~
~ publisher losses from piracy. In addition, they ruin ~
~ the reputation of the hundreds of legitimate bulletin ~
~ boards that serve an important function for computer ~
~ users. ~
--Ken Wasch, Executive Director of the SPA, as quoted in
STR #915
I recently logged on to the Polish Hideout BBS in Southern
Illinois. What a contrast it presented to the pirate boards I've
been investigating! The questionnaire asked only for my name,
contact information, and type of computer. Validation was
immediate and I was granted access to all message bases and file
areas on that very first call! I wasn't under any obligation to
upload before downloading. There was no pressure to compromise
my principals nor temptation to indulge in criminal activity.
The messages from the sysop were friendly and inviting. The
Polish Hideout is _not_ a pirate BBS.
It can be tough to differentiate a pirate board from a legitimate
one if one has not been granted access to the elite areas.
Sometimes non-elite discussion or file areas can provide hints,
but it's not sure-fire. For example, although many pirate boards
can boast of extensive pornography collections, some BBS sysops
who wouldn't tolerate commercial files will nevertheless offer
pornography; the existence of pornographic files does not in and
of itself indicate a pirate board or clientele. Even the
existence of an isolated commercial file in the downloads is not
evidence of intentional piracy. From time to time, every BBS
receives a commercial upload or two; sometimes the sysop overlooks
the file or doesn't recognize it as commercial and leaves it in
the download area. Such oversights and accidents do not even
remotely correspond to the kinds of activity we have encountered
on BBSs where software theft is encouraged.
A typical pirate board includes a highly aggressive (and often
hostile and suspicious) new user questionnaire. It is often
necessary to provide referrals of some kind, and the questions
are likely to assume dishonesty on the part of the new user.
Pirates, as a rule, are not nice guys, and the new user is
usually made to feel very uncomfortable. The new user may be
required to "sign" disclaimers. The Other BBS list is likely to
include some other pirate boards. If the users adopt the lexicon
of piracy ("elite", "warez", "philez", etc.), If ThErE aRe LoTs
Of PhRaSeS wRiTtEn LiKe ThIs, if the board associates itself with
a pirate syndicate or network, if it has numerous known pirates
as callers, if there is aggressive insistence on the maintenance
of download/upload ratios, if deadbeats are threatened with loss
of access, if phreaking files are available online, chances are
very good that the caller has stumbled onto a pirate BBS.
There are legitimate reasons why a BBS sysop might want accurate
contact information from his callers. There are also good
reasons in many cases for offering a few private file and message
areas. Most BBSs, pirate and legitimate, require validation,
usually by phoning the caller's number. Such features are not
unusual, but if combined with heavy-handed warnings and threats,
they tip the user off to the nature of the board. It should be
noted that legitimate pd/shareware BBSs far outnumber the pirate
boards. The confusion between the two is most unfortunate.
~ I...have callers uploading commercial software and ~
~ giving me a hard time because I don't have an "elite" ~
~ area, even though they see a message when they log on ~
~ as a new caller that this board does not support ~
~ piracy...It's a _risk_ to run a BBS, and not many ways ~
~ to protect the investment. ~
--sysop of a legitimate BBS
If a board you call has an occasional commercial file, be sure to
point it out to the sysop for his own protection; a responsible
sysop will avoid commercial offerings. PD/shareware BBSs perform
a much-needed service in supporting our Atari community; the IAAD
applauds and encourages this effort.
If you suspect -- or _know_ -- that a board you call offers
numerous commercial files, however, please bring it to the
attention of the IAAD (online addresses are available at the end
of this article). Your anonymity is assured. We are already
intimately familiar with dozens of boards, but additional
information is always welcome.
8. The Moral Toll: As the Twig is Bent...
~ Right and wrong now seem the same ~
-- Rats Nest
As a parent, I'm concerned about the numbers of young people
logged on to pirate boards. These kids put themselves in a very
vulnerable position. In earning their right to download, young
callers are implicated in the illegal activity. The adults who
run and participate on these boards set an example which could,
by extension, lead to ignoring the laws which govern other areas
of their lives. Do these kids also shoplift, steal from other
kids' lockers, buy termpapers to submit as their own? Children
learn to run and to use pirate boards from adults whose character
is questionable by definition. When a child has such a sysop as
a role model, what does that spell for his future?
Like the proverbial stranger who offers candy, these criminals
lure teenagers and young adults with promises of free software in
exchange for their services. The service, of course, is to
provide more free software -- which the sysop can then use to lure
more callers and to keep his current clientele calling back. The
first step is to inspire fear; this is achieved right off the bat
with a new user questionnaire threatening denial of access if
caller doesn't provide just the right answers. And the second is
to force the caller to incriminate himself with his initial
upload. Once the kid begins downloading and playing commercial
games he could never afford to buy, the pressure cycle of
upload/download counts begins.
~ GENESIS COPIER (super magic drive) ~
~ My son is selling his copier for the Genesis for: ~
~ $275.00 That includes the copier, drive and power ~
~ supply. ~
--Little Lulu on the F-Net, Pompey Pirates Elite
Conference
While many of the software thieves we've encountered are young,
in their teens and early twenties, others are old enough to be
parents (or even grandparents!). Few pirate boards have an
"educational warez" category in their files areas, so my own
products are rarely found, but parents do download plenty of
games. I wonder about the children who use the programs that
Dad or Mom has stolen. Do they know that the program could be
purchased with a manual? Do they learn about hidden features
from friends who have the real thing and then wonder why their
parents never told them they could do that? If and when these
children do learn that Dad has stolen some software they've
enjoyed, do they respect and trust their father less -- or do
they simply adopt his dishonest character as their own?
~ Pirating is dishonest. Honorable people don't do ~
~ dishonest things. If you want to publicly proclaim your ~
~ untrustworthyness [sic], go right ahead. But don't ~
~ expect anyone to ever trust you. Or respect _your_ ~
~ rights. ~
-- Myeck Waters, responding to a pro-piracy post on the
F-Net, ST Report Conference
~ BYE! (Click) ~
~ NO CARRIER ~
-- Computer Connection
_________________
The author takes no responsibility for errors in spelling,
punctuation, judgment, or logic in quotations; these are
reprinted as written.
Copyright 1993 by D.A. Brumleve
This file may be transmitted only in its entirety, with all
portions unedited and intact. The author reserves _all_ rights
regarding distribution and republication, with the exception that
this file may be posted in its entirety and without additions on
BBSs everywhere, especially on pirate boards. If you find it
already posted on your local pirate board, please upload a second
copy, and a third...
Editors and others wishing to republish this article are advised
to contact the IAAD and the author on the major online services:
GEnie: PERMIT$
CIS: 76004,3655
Delphi:DABRUMLEVE
The IAAD welcomes tips about pirate activity. Please contact us
at the online addresses listed above.